Difference between revisions of "Acceptable Use Policy"

From PDP/Grid Wiki
Jump to navigationJump to search
m
m
Line 1: Line 1:
 
This Acceptable Use Policy governs the use of the Nikhef networking and computer services; all users of these services are expected to understand and comply to these rules.
 
This Acceptable Use Policy governs the use of the Nikhef networking and computer services; all users of these services are expected to understand and comply to these rules.
  
# '''Use for intended purpose'''
+
# <div class="NavFrame"><div class="NavHead">Use for intended purpose</div><div class="NavContent">Nikhef offers the services to enable the users (employees, students and collaborators) to do their work. The services may not be used for commercial or political purposes. A limited amount of private use is allowed as long as it does not interfere with normal duties and does not incur significant cost. When in doubt about any person use, ask first!<br>Of course, there are lots of actions that are most certainly not intended: sending spam, trolling on forums or newsgroups, forwarding chain letters or phishing attempts, cracking password, attacking other systems on the Internet, random calling or tele-marketing, stalking, etc.</div></div>
#:Nikhef offers the services to enable the users (employees, students and collaborators) to do their work. The services may not be used for commercial or political purposes. A limited amount of private use is allowed as long as it does not interfere with normal duties.
 
 
# '''Obey the law'''
 
# '''Obey the law'''
 
# '''Respect the authorization restrictions set by Nikhef system administrators'''
 
# '''Respect the authorization restrictions set by Nikhef system administrators'''

Revision as of 21:39, 26 April 2011

This Acceptable Use Policy governs the use of the Nikhef networking and computer services; all users of these services are expected to understand and comply to these rules.

  1. Obey the law
  2. Respect the authorization restrictions set by Nikhef system administrators
  3. Respect intellectual property and confidentiality agreements
  4. Protect your access keys (passwords and certificates)
  5. You share resources with others - be nice
    Even when staying within the intended use, it is possible to strain resources to such an extent that other users can no longer make use them. In such cases users should work together with system administrators to find less disruptive alternatives.